Filter by:

Limit to items where the date of the news item:
Date range
Limit to items where the date of the news item:
Limit to news where the title matches:
Limit to news items tagged with one or more of:
Limit to news items where the audience is one or more of:

Kin offers a unique way to earn and spend value while taking part in digital world activities.

Ted Livingston saw the future on a smartphone while he was a Waterloo Engineering student doing a string of co-op work terms at BlackBerry.

Now, more than a decade later, he is determined to both shape that future and make it pay as founder and CEO of Kik Interactive, a mobile chat platform that achieved unicorn startup status - one of six unicorns with roots at Waterloo Engineering - with a US $1-billion valuation in 2015.

The biggest cybersecurity threat most organizations face doesn’t come from an anonymous hacker halfway around the world.

Instead, it’s someone within their own walls: a disgruntled employee who wants to wreak havoc, a “trusted” third-party contractor, or even a well-meaning worker inadvertently exposing the company to dangerous malware.

For smaller organizations, keeping sensitive material out of the wrong hands is a pretty straightforward process.

Controlling access is at the heart of cybersecurity threats.

Monday, May 1, 2017

Connected, but protected

If hackers made their way into your Fitbit and messed with your daily step count — you might be confused and annoyed.

But what if a hacker altered the heart rhythms in your pacemaker or the brakes on your connected car? What if someone found a way to empty cash from your bank account by hacking the embedded chip in the digital device you carry around to make automatic payments?

In one corner of Professor Catherine Gebotys’s lab, a laser beam is strategically aimed to disrupt circuit board operations. Nearby, electromagnetic pulses bombard an uncapped chip while a couple of graduate students track the results on an oscilloscope screen.

By probing for vulnerabilities that hackers could exploit, her team at the University of Waterloo’s Faculty of Engineering is making the Internet of Things more secure.

Defending against memory buffer overflow attacks is a daunting proposition for computer software developers.

Failing to carefully specify appropriate inputs opens the door for hackers to insert malicious code by overwhelming a system’s memory space with unanticipated inputs.

But how do you plan for every possible type of input a hacker could use? You turn to Vijay Ganesh.